Professional Documents
Culture Documents
Engineering-II
(Solved Macq’s)
LECTURE FROM
(23 to 45)
Junaidfazal08@gmail.com FOR MORE VISIT JUNAID MALIK
Bc190202640@vu.edu.pk
VULMSHELP.COME 0304-1659294
Question No: 1
_ is defined as the probability of failure free operation of a
computer program in a specified environment for a specified time.
► Software Reliability
► Software Usability
► Software Integrity
► Software Efficiency
Question No: 2
Schedule Performance Index SPI) is equal to
► BCWP / BCWS
► BCWP * BCWS
► BCWP + BCWS
► BCWP - BCWS
Question No: 3
The two objectives of a are to identify problem areas within the
work product and a checklist of action items.
► Review Issue List
► Formal Technical Reviews
► Informal Technical Reviews
► Testing
Question No: 4
It is noted that a/an _ _ review can be worse then no review at
all
AL-JUNAID TECH INSTITUTE
► Uncontrolled
► Controlled
► Intermediate
► Normal
Question No: 5
The Review participants SHOULD NOT be focused on .
► Weaknesses of the developer
► Time Lines
► Review agenda
► Work product
Question No: 6
The progress on a project at any given point in time can be calculated
by:
► Adding all the BCWS till that point for all tasks
► Multiplying all the BCWS till That point for all task
► Adding BCWS and EVA for all task still that point
► Dividing all the BCWS till That point for al tasks
Question No: 7
Milestone represents:
► The defined target which you need to achieve
► A predictable risk that may hit the project
► An unpredictable risk that may project
► The Loss that organization may suffer due to risk
AL-JUNAID TECH INSTITUTE
Question No: 8
If an error related to requirements is identified in testing phase, error
will be considered an error of _ _ phase.
► Requirement
► Design
► Code
► Testing
Question No: 9
_ _ involves rework, repair, and failure mode analysis of the
product.
► Internal Failure Cost
► External Failure Cost
► Appraisal Cost
► Prevention Cost
Question No: 10
If:
E = Errors found before shipment
D = Errors found during operation
Then Defect Removal Efficiency (DRE) is equal to:
► DRE = E = / (E+D)
► DRE = E = * (E+D)
► DRE = E = + (E+D)
► DRE = E = - (E+D)
Question No: 11
BCWS is term used in Eamed Value Analysis it stands for .
AL-JUNAID TECH INSTITUTE
► Budgeted Cost of Work Schedule
► Budgeted Cost of Whole System
► Beginning Cost of Whole System
► None of the given options
Question No: 12
_ states that 80% of the defects can be traced to 20% of its causes.
► Pareto Principle
► Fred Brooks Principle
► Kraul Principle
► D.Streeter Principle
Question No: 13
The basis principle for a review is that the focus should be on the
_ ..
► Product and not the producer
► producer and not the Product
► Profit to be gained
► Presentation Slide
Question No: 14
Many defect identified in few components at design level testing/review,
a software development team should .
► Allocate good and extra resources at coding level to review these
components thoroughly
► Good achievement by designing team
► No need to allocated further resources at coding level to review these
components
AL-JUNAID TECH INSTITUTE
► Mission accomplished once good number of error/flaws identified level
Question No: 15
Milestone represents:
► The defined target which you need to achieve
► A predicable risk that may hit the project
► A unpredictable risk that may hit the project
► The Loss that organization may suffer due to risk
Question No: 16
_ a statistical technique is used to develop an overall indication of
improvement in software quality.
► Error index
► Pareto Principle
► Quality Assurance
► Cost of Quality
Question No: 17
A model where Some errors are passed through to the next stem
undebated such errors are said to have been .
► Amplified
► Reduced
► Neutralized
► Multiplexed
Question No: 18
Earned Value Analysis (EVA) is a technique for
assessing the progess of a project.
AL-JUNAID TECH INSTITUTE
► Quantitative
► Subjective
► Qualitative
► Descriptive
Question No: 19
It is noted that a/an _ _ review can be worse than no review at all.
► Uncontrolled
► Controlled
► Intermediate
► Normal
Question No: 20
FTR is a quality control activity performed by software enginers.it
stands for:
► Formal Technical Review
► Formatted Technical Review
► Feasibility of Technical Requirement
► Fetched Technical Requirement
Question No: 21
Earned Value analysis (EVA) is a technique for assessing the progress of a
project
► quantitate
► Subjective
► Descriptive
► Qualitatives
AL-JUNAID TECH INSTITUTE
Question No: 22
Question No: 31
FTR stands for:
Question No: 33
Poka-Yoke is the name of a:
QA technique
Japanese dish
Idiom
None
Question No: 34
Quality cost may be divided into costs associated with:
Question No: 35
If an error related to requirements is identified in the testing phase, this error
will be considered as an error of
Requirement
Design
Code
Testing
Question No: 36
AL-JUNAID TECH INSTITUTE
In order to use the PERT and CPM, which one of the followings is NOT
required?
Question No: 36
if:
E = Errors found before shipment
D = Errors found during shipment
Then Defect Removal Efficiency (DRE) is equal to:
DRE = E + (E+D)
DRE = E - (E+D)
DRE = E * (E+D)
DRE = E / (E+D)
Question No: 37
Following are effective guidelines for Review EXCEPT:
Question No: 38
The basic idea behind Software configuration management is:
Question No: 39
Earned Value Analysis (EVA) is a _ technique for assessing the progress
of a project.
Qualitative
Quantitative
Subjective
None
Question No: 40
Quality cost may be delivered into costs associated with:
Prevention, appraisal and failure
Customers, developers and maintenance
Builds, releases and products
Bugs, errors and reports
Question No: 41
A Software Requirement Specification is traced if the of its requirements is clear.
Quality
Slandered
Origin ✔
None
Question No: 42
Version Control discusses about:
How does an organization control changes before and after software is released
to a customer
How the resources will be assigned to tasks in work breakdown structure (WBS)
How the test cases will be executed before deploying each release.
All of given
Question No: 43
The implemented requirement has been through the selected approach, such as
testing or inspection.
Verified
Deleted
Approved
AL-JUNAID TECH INSTITUTE
None
Question No: 44
The Software reengineering is a activity.
Code
Out dated
Document
Non-trivial
Question No: 45
Which of the following is NOT an example of Software Configuration Item (SCI):
Test Case
Integration Plan
Design specification
None
Question No: 46
Mean Time Between Failure (MTBF) can be calculated by:
MTBF = MTTF + MTTR
MTBF = MTTF - MTTR
MTBF = (MTTF/MTTR)*100
MTBF = (MTTR/MTTF)*100
Question No: 47
software development is itself risky as changes to one part of the system
inevitably involve further changes to other components.
Forward
Reverse
Old
New
Question No: 48
Program is restructured the reverse engineering phase. In this case we modify
source code and data in order to make it amenable to future changes.
After
None
Along with
Before
Question No: 49
AL-JUNAID TECH INSTITUTE
Managers look at the system from the angle that does the system and associated
business process make an effective contribution to the business goal?
Senior
IT
None
Line
Question No: 50
user assess the system from the perspective of how effective do they find the
system in supporting their business processes and how much of the system
functionality is used.
Senior
IT
Line
End ✔
Question No: 51
A system is considered to be a legacy system if it has been in operation for years.
A legacy system has many components.
Less than seven
Many ✔
More than two
Less than ten
Question No: 52
Legacy system migration, however, is an easy task and there are a number of risks
involved that need to be mitigated
Simple
Crucial
None
Easy
Question No: 53
engineering does not simply create a modern equivalent of an older program,
rather new user and technology requirements are integrated into the reengineering
effort
Forward
None
Reverse
BPR
AL-JUNAID TECH INSTITUTE
Question No: 54
Which of the following the NOT one of the attributes of requirements.
Requirement ID
Creation Date
Created By
Received By
Question No: 55
If the version of a release changes from 1.0.0 to 2.0.0 what will you conclude about
new release (having version 2.0.0)
There was no change in functionality
There was major change in functionality
There was partial change in functionality
Bugs in previous functionality were removed
Question No: 56
Which of the following is NOT one of the tasks included in Software Configuration
Management.
Version Control
Configuration Auditing
Test Case development
Change control
Question No: 57
are sometimes also knowns as walkthroughs or inspects
Formal Technical review
Testing
Debugging
Informal Technical review
Question No: 58
In order to use the PERT and CPM, which one of the following is not
required?
Inerdependencies
Estimation of effort
Teams communication mode details
Decomposition of tasks-also known as the work breakdown
structure(WBS)
AL-JUNAID TECH INSTITUTE
Question No: 59
A requirement related detected in any (design, source code testing) will
be called_
Requirements defect
Design related defects
Source code defect
Zero level defect
Question No: 60
Cost of quality increase as we go from
Detection to preventation to Failure
Preventation to Detection to Failure
Failure to Preventation to Detection
Detection to Failure to Preservation
Question No: 61
Then Defect Removal Efficiency (DRE) is equal to:
ANS: - DRE = E / (E+D)
Question No: 62
a statistical technique is used to develop an overall indication of improvement
in software quality.
ANS: - Error Index
Question No: 63
The two objectives of a are to identify problem areas within the work product
and a checklist of action items.
ANS: - Formal Technical Reviews
Question No: 64
states that 80% of the defects can be traced to 20% of its causes.
ANS: - Pareto Principle
Question No: 65
Work products used to track errors is/are _ during software development.
ANS: - Requirements specification, design document and source code
AL-JUNAID TECH INSTITUTE
Question No: 66
BCWP refers to:
ANS: - Budgeted cost of work performed so far
Question No: 67
Milestone represents:
ANS: - The defined target which you need to achieve
Question No: 68
Earned Value Analysis (EVA) is a technique for assessing the progress of a project.
ANS: - Quantitative
Question No: 69
FTR is a quality control activity performed by software engineers, it stands for:
ANS: - Formal Technical Review
Question No: 70
BCWS is a term used in Earned Value Analysis it stands for .
ANS: - Budgeted Cost of Work Schedule
Question No: 71
The degree of rigor in determining the set of tasks can be categorized as
caual,Quick Reaction, strict and_
Uniform
Unstructured
Decomposed
Structured
Question No: 72
if:
E = Errors found before shipment
D = Errors found during operation
Then Defect Removal Efficiency (DRE) is equal to:
DRE = E / (E+D)
DRE=E+(E+D
DRE=E*+(E+D)
DRE=E-(E+D)
Question No: 1
AL-JUNAID TECH INSTITUTE
A law affirming that to continue after a certain level of performance has been reached will result in a
decline in effectiveness. This law is know as
Question No: 2
Requirement gathering
Testing
Configuration Management (Page 8)
Coding
Question No: 3
Chaotic
Initial
Level 1
Repeatable (Page 12)
Question No: 4
ambiguous/incomplete requirements
changing customer requirements
the fact that company was not CMM certified (Page 28 - 29)
failure in project management
Which of these is not a valid reason for measuring software processes, products, and resources?
to price them
to improve them
to characterize them
to evaluate them
Question No: 8
Question No: 10
When more than one user interpret the same requirement in different ways then we can say that the
requirements are
Question No: 11
Testing and Software Quality Assurance activities are exactly similar activities with different names
AL-JUNAID TECH INSTITUTE
True
False (Page 69)
If an error related to requirements is identified in testing phase, so this error will be considered as an
error in phase.
Design
Code
Requirement
Testing
Question No: 13
True
False
Efficiency
Ease of use
Maintainability
All of the given (Page 106)
If an error related to requirements is identified in Coding, so this error will be considered as an error in
phase.
Design
Code
Requirement
Testing
Question No: 16
Error
Defect
Fault
Mistake
AL-JUNAID TECH INSTITUTE
Question No: 17
Inspection
JAD (Page 110)
Walkthrough
Question No: 18
Work product
Weaknesses of the developer (Page 113)
Time lines
Review agenda
Question No: 19
Review leader
All reviewers
CEO (Page 112)
Product Producer
Question No: 20
Question No: 21
Reliability and Safety are same concepts with respect to software quality
Question No: 22
The prevention of defects being injected into the software can help in decreasing the cost of software.
True
False
Question No: 23
AL-JUNAID TECH INSTITUTE
Poka Yoke is the name of a
Japanese dish
QA technique (Page 118)
Idiom
None of the given
Question No: 24
If a new version of a product is released by fixing the bugs in the previous release then it is termed as
Question No: 25
Question No: 26
In the software development life cycle, soon the defect is detected will results in
Question No: 27
testing verifies the correct implementation of internal units, structures and relationship
among them.
Black box
White box
Gray box
Question No: 28
The template for organizing SRS given by American Department of Defense and NASA should be used for
AL-JUNAID TECH INSTITUTE
none of the given
large and complex projects
small project
medium size projects
Question No: 29
If you know the relationship between the use cases, classes, GUIs, Test cases and other artifacts then we
can say that requirements are traceable in that project.
True
False (Page 133)
There may be one or more GUIs that are part of any good software but may not satisfy any requirement
True
Fals
Question No: 31
business processes
system hardware
marketing (Page 134)
application software
Question No: 32
There are many reasons for which the legacy system become difficult to maintain EXCEPT
Question No: 33 In , new user and technology requirement can also be integrated
into the re-engineering effort.
Backward re-engineering
Forward re-engineering (Page 140)
Business Engineering
Business Process Engineering
Question No: 34
AL-JUNAID TECH INSTITUTE
Large classes reduces
Question No: 35
1
(Page 169)
5
6
Question No: 36
Question No: 37
Empirical models are statistical models and are based upon historic data
Question No: 38
Error tracking provides a quantitative means of assessing the quality of the individuals implementing a
software product.
True
False
There are tools available in the market for project tracking. These tools can automatically track and
manage the project replacing the need of any human being as a Project Manager.
True
False
Question No: 40
AL-JUNAID TECH INSTITUTE
Two tools for computing critical path and project completion times from activity networks are
Question No: 41
In order to measure the design quality, if the frequency of ripple defects is too large, then it means that
there is tight coupling and hence the
design is maintainable
design is not maintainable (Page 79)
design has completed
none of the given
Question No: 43
The only reason for an estimate to be unreliable is lack of experience related to the application on the
part of the estimator.
true
false
Question No: 44
Question No:45
Question No: 46
_ Subgroups are those that the user has the option of using one or none of the subgroups
during an elementary process.
Question No: 47
Process discipline is unlikely to be rigorous, but where it exists it may help to ensure that existing processes
are maintained during times of stress and this is done at CMM level ------ --.
1
4
3
2 (Page 172)
Which one of the following activities does not belong to Risk Mitigation, Monitoring, and Management
Plan?
Question No: 49
Interdependency identification
Time allocation
Effort validation
Function point analysis (Page 93)
Milestone definition
Question No: 50
AL-JUNAID TECH INSTITUTE
With a complex class you have to move data and methods around in small pieces to avoid errors, it seems
slow but it is the because you avoid debugging
Question No: 51
Question No: 52
The RMMM plan assists the project team in developing strategy for dealing with risk. In this context, an
effective strategy must consider:
Risk avoidance
Risk monitoring
Risk management and contingency plan
All of the given choices (Page 89)
Question No: 54
Which is used to determine the most viable option for cost estimation when the information in
the “Decision tree” is complete.
After building the Decision Tree, following formula is used to find the expected cost for an option.
Choose the correct formula:
Question No: 56
Degree of uncertainty that the product will meet its requirements and be fit for its intended use
is the
Cost risks
Schedule risks
Performance risks (Page 87)
None of the given choices
Question No: 57
Every task or group of tasks should be associated with a project --------- --.
Schedule
Member
Manager
Milestone (Page 93)
Question No: 59
Which one is not the Software project planning activity carried out by the project manager for
estimation?
Question No: 61
Schedule Product
all of the given choices are correct Click here for detail
Defective Product
Higher Maintenance Costs
Question No: 62
Degree of uncertainty that the product will meet its requirements and be fit for its intended use is the
Cost risks
Schedule risks
Performance risks (Page 87)
None of the given choices
Question No: 63
Proactive risk management philosophy is also some times termed as Indiana Jones school of risk
management
true
false (Page 84
Question No: 64
Question No: 65
AL-JUNAID TECH INSTITUTE
Phase Index can be calculated by the help of the following formula, where
Ei – the total number of errors uncovered during the ith step in the SE process
ws, wm, wt – weighting factors for serious, moderate, and minor errors
Question No: 66
The higher the Error Index, the higher will be the Defect Removal Efficiency
Question No: 67
The goal of quality assurance is to provide management with the data needed to determine which
software engineers are producing the most defects.
true
False
From the following listed software development Model, which one is an object oriented model
Question No: 69
Question No: 70
Which one of the following does not belong to a strategy for dealing with risk?
Risk avoidance
Security risk assessment (Page 89)
Risk monitoring
Risk management and Contingency planning
Question No:71
A entity is the one which have any -----------in the problem domain without some other entity.
Strong, Role*
All of the given
Weak, Function
None of the Given (Page 47)
A weak entity is the one which does not have any role in the problem domain without some other entity
Question No: 72
ILF is a --------------- identifiable group of logically control informations ------------- the boundary of the
application.
user, within (Page 42)
user, without
All of the given
user, along
Question No: 73
Several entities are always created -------------- and deleted together then this is a strong indication that
they should be grouped into --------- logical file/files.
Together, Single (Page 48)
Together, Multiple
Together, Double
All of the given
Question No: 74
AL-JUNAID TECH INSTITUTE
Which of these software characteristics are used to determine the scope of a software project?
Question No: 75
Question No: 76
Question No: 77
False
True (Page 71)
True
false
Question No: 79
While performing risk analysis, the impact of risk can not be measured quantitatively
True
False
Question No: 81
Functional requirements
non-functional requirements
Functional requirements and non-functional requirements (Page 71)
None of these
Question No: 82
The model is used to overcome issues related to understanding and capturing of user
requirements.
Question No: 83
Status Quo
Problem definition
Technical development
Task set (Page 10)
Managed
Defined
Initial (Page 12)
Repeatable
Question No: 85
AL-JUNAID TECH INSTITUTE
According to DeMarco a good Project Manger
The best project team organizational model to use when tackling extremely difficult problems is the
Question No: 87
Which factor is the least important when choosing the organizational structure for a software team?
Product and process decomposition occurs simultaneously as the project plan evolves
True
False
Question No: 89
Measuring the quality and performance of a software through any mean is much better than just
making a guess about it.
True
false
Question No: 90
Elementary Process
External Query
External Output
AL-JUNAID TECH INSTITUTE
Control Information (Page 43)
An entity which defines many-to-many relationship between two or more entities is called
Question No: 92
Question No: 93
Question No: 94
Defect Removal Efficiency (DRE) can be measured by where E is Errors found delivery and D is error
found after delivery (typically within the first year of operation)
Question No: 95
Export operation
Export output
External output (Page 49)
AL-JUNAID TECH INSTITUTE
None of these
Question No: 96
In a team is structured loosely and depends on individual initiative of the team members
Question No:97
Question No: 98
Coding pg#8
Configuration Management
Quality Assurance
Project planning Question No: 99
level 1
initial level
level-4 (Page 12)
level-3
Organization
Motivation
Innovation (Page 30)
Managerial Identity
35
40
20
25 (Page 7)
languages , processes
classes ,objects
processes, tools (Page 4)
tools, objects
Question No:105
Biology
Physics
chemistry
Economics (Page 5)
LOC
milestone
unit
none of given
achievable
feasible
unrealistic (Page 29)
realistic
improvement
motivation (Page 30)
innovation
creation
Caper Jones is famous researcher in the field of who made a company named Software
Productivity Research
Biology
Chemistry
Mathematics
Software Engineering (Page 7)
AL-JUNAID TECH INSTITUTE
Question No: 111
In model user feedback is received very quickly because product is delivered in small versions.
waterfall
spiral
incremental (Page 18)
object oriented
Controlled Decentralized
Informal, interpersonal procedures
Controlled Centralized
Democratic Decentralized (Page 32)
Installation
risk analysis
development (Page 8)
debugging
analytical , user
mathematical, user
logical, process
qualitative , process (Page 12)
Incremental
RAD
Waterfall (Page 34)
Prototype
Efficiency
Performance
Productivity
Maturity (Page 12)
After passing though all the stages of the software development when we deploy the new system at the
user side that stage is called
Integration
Development
Installation
level1
AL-JUNAID TECH INSTITUTE
level 2
level3
level5 (Page 12)
Function Point analysis is helpful in calculating the size of the software for _
The extent to which a program satisfies its specification and fulfills the customer’s mission objectives is
said to be achieving the
Usability
Efficiency
Reliability
Correctness
What activity/activities , we can perform to identify the needs and benefits of a task?
Question No:126
The greater the dependency between the components the greater is coupling
The lesser the dependency between the components the greater is coupling
The greater the dependency between the components the lesser is coupling
None of the given
In context of moving range and individual control charts, UNPL stands for:
Universal Natural Process Line
Universal Natural Process Limit
Upper Natural Process Limit (Page 77)
Upper Natural Process Line
Effort required to test a program to ensure that it performs its intended function _
Review is a type of that helps preventing the bugs to move in the next stage of software
development Bug seeding tool
give you a better insight into the state of the process or product
Metrics (Page 66)
Efficiency
Reliability
Usability
Determination of the .................... is a pre-requisite of all sorts of estimates, including, resources, time,
and budget.
AL-JUNAID TECH INSTITUTE
software scope (Page 80)
software Risk
software Quality
software Management
we need to employ some statistical techniques and plot the result ------------ --. This is known as
statistical control techniques.
Graphically (Page 74)
automatically
manually
personally
The extent to which a program satisfies its specifications and fulfills the customer’s mission objectives is
AL-JUNAID TECH INSTITUTE
Integrity
Reliability
Correctness (Page 67)
none of given
Metrics to assess the quality of the analysis models and the corresponding software specification were
proposed
in 1993- 1999.
Ricado in 1993
Davis in 1990
Davis in 1993 (Page 71)
If Configuration item identification is not identified, it is possible to control changes and establish
records.
Defective Product
Schedule Product
A,B,C
B,C,D
A,B,D
AL-JUNAID TECH INSTITUTE
A,B,C,D
When an Item is baselined, it becomes frozen, here frozen means, that the item can be changed only by
creating an old version
The most important objective of any engineering activity is to produce high quality product with limited
resources and
Time (Page 66)
Persons
Cost
Metrics
Extent to which access to software or data by unauthorized persons can be controlled and called
None of given
Efficiency
Reliability
Integrity (Page 67)
Requirements engineering is the basis of the contract between the developer and the client.
True
False Written as a contract between client and contractor
Legacy system migration is usually hard. One important reason is that no proper documentation of the
system is available
True
False (Page 134)
While assessing a legacy system for further decision, one should decide the following about the supplier
Documentation
Understandability
Code Refactoring (Page 137)
Test data
interface
design (Page 139)
data structure
functionality
technique was initially developed for manufacturing processes in the 1920’s by Walter Shewart.
Upper Control Line
Control chart (Page 75)
AL-JUNAID TECH INSTITUTE
CMP
Quality
“A method requires lot of information from some other class” is a symptom of bad
smell
Data clumps
Lazy class
Feature envy (Page 143)
Long Method
integrates system and software disciplines into single process improvement framework
for introducing new disciplines as needs arise.
SEI
CMMI
CMM
ISO
In measuring Software Process Quality by using control charts, if the gap between the defects reported
and defects fixed is increasing, then it means
Although there are many different models developed by different researchers for estimation, all of them
share which one of the following basic structure
AL-JUNAID TECH INSTITUTE
E = 3.2 (KLOC)1.05
E = A + B * (ev)C (Page 81)
E = [LOC x B0.333/P]3 x (1/t4)
none of the given
This chart is then used to develop the individual control chart is called statistical control techniques.
Yes (Page 77)
No
Logical
Neural
Physical
Critical
the latest time for task initastion before the minimum project completion time is delayed
The earliest finish
The latest finish
AL-JUNAID TECH INSTITUTE
All of the given options (Page 100)
Quality is the compliance of software to implicit and explicit quality factors. Identify the explicit
requirement from the following:
Maintainability
Compliance with CMMI (Page 106)
Ease of use
Efficiency
Question No:170
In order to use the Pert and CPM, which one of the following is not required?
Question No:172
The Change Control Authority does not have the rights to permit to bring the change in the software
True
False (Page 124)
Check in and check out is actually one and the same process with two different names
True
False (Page 124)
is the process of Design recovery. At this stage the documentation of the overall
functionality is created.
Database Engineering
Reverse Engineering (Page 139)
Refactoring
Forward Engineering
Earned Value Analysis (EVA) is a _ technique for assessing the progress of a project.
Qualitative
Quantitative (page 102)
Subjective
None of the given options
The formal methods model of software development makes use of mathematical methods to
Which one of the following describes the data and control to be processed, function, performance,
constraints, interfaces, and reliability?
Product Quality
Software scope estimation (Page 80)
Resources requirements
Time requirements
The software plan is not a static document, it is frequently adjusted to make the project appear on track
to meet all deadlines and quality targets.
True
False
The processes at ———– is focus on continually improving process performance through both
incremental and innovative technological changes/improvements.
Level 5
Level 1
Level 4
Level 3
Quantitative process-improvement objectives for the organization are established, continually revised to
reflect changing business objectives at ————-.
Level 3
Level 2
Level 5
Level 1
Reliability of a software is a
functional requirement
non-functional requirement
Design Requirement
None of the given
Casual
Structured
Strict
TSS (Page 66)
Mathematical
Perfect
Haphazard
Planned
AL-JUNAID TECH INSTITUTE
Question No: 193
While creating matrix for a set of projects, data should be collected that belongs to a similar domain
is one of the techniques to prepare project schedule once we have defined "task network"
While managing the historical data, we should consider the following except
Data should be collected only from scientific projects and applications (Page 72)
Data should be collected from many projects
Data should be consistent
Correct data should be taken
Question No:199
When a software is delivered to a client and then client reports the bug in it then that bug is termed as
Error
Defect
Mistake
Fault
Review
Testing
Project Planning
Inspection (Page 177)
True
False (Page 177)
if: E = Errors found before shipment D = Errors found during operation Then Defect Removal Efficiency
(DRE) is equal to:
DRE = E + (E+D)
DRE = E - (E+D)
DRE = E * (E+D)
DRE = E / (E+D) (Page 104)
The progress on a project at any given point in time can be calculated by:
Adding all the BCWS till that point for all tasks (Page 102)
Multiplying all the BCWS till that point for all tasks
Adding BCWS and EVA for all tasks till that point
None of given options
A redesigned business process must be prototyped before it is fully integrated into the business.
False
True (Page 141)
The list of the resources that may be needed for future activities.
The chain of tasks that determines the duration of the project. (Page 100)
The list of the deficient resources, project is suffering from.
None of the given options.
AL-JUNAID TECH INSTITUTE
Question No: 214
Milestone represents:
The more you refine the tasks, the more you can:
Question No: 1
BCWS is term used in Eamed Value Analysis it stands for _.
► Budgeted Cost of Work Schedule
► Budgeted Cost of Whole System
► Beginning Cost of Whole System
► None of the given options
Question No: 2
states that 80% of the defects can be traced to 20% of its
causes.
► Pareto Principle
► Fred Brooks Principle
► Kraul Principle
► D.Streeter Principle
Question No: 3
AL-JUNAID TECH INSTITUTE
The basic principle for a review is that the focus should be on the
.
► Product and not the producer
► producer and not the Product
► Profit to be gained
► Presentation Slide
Question No: 4
Many defect identified in few components at design level
testing/review, a software development team should _ .
► Allocate good and extra resources at coding level to review these
components thoroughly
► Good achievement by designing team
► No need to allocated further resources at coding level to review
these components
► Mission accomplished once good number of error/flaws identified
level
Question No: 5
Milestone represents:
► The defined target which you need to achieve
► A predicable risk that may hit the project
► A unpredictable risk that may hit the project
► The Loss that organization may suffer due to risk
Question No: 6
a statistical technique is used to develop an overall
indication of improvement in software quality.
► Error index
AL-JUNAID TECH INSTITUTE
► Pareto Principle
► Quality Assurance
► Cost of Quality
Question No: 7
A model where Some errors are passed through to the next stem
undebated such errors are said to have been_ .
► Amplified
► Reduced
► Neutralized
► Multiplexed
Question No: 8
Earned Value Analysis (EVA) is a technique for
assessing the progress of a project.
► Quantitative
► Subjective
► Qualitative
► Descriptive
Question No: 9
It is noted that a/an _ review can be worse than no review
at all.
► Uncontrolled
► Controlled
► Intermediate
► Normal
AL-JUNAID TECH INSTITUTE
Question No: 10
FTR is a quality control activity performed by software enginers.it
stands for:
► Formal Technical Review
► Formatted Technical Review
► Feasibility of Technical Requirement
► Fetched Technical Requirement
Question No: 11
Legacy system migration however is a task and
there are a number of risks involved that need to be mitigated.
► Crucial
► Simple
► Straight-forward
► Easy
Question No: 12
An Engineering Change Order (ECO) defines the change be made,
its constraints and _ .
► Criteria for Review and Audit
► Removal of Change Request
► Approval by change control Board (CCB)
► Approval by Change Control Authority (CCA)
Question No: 13
A system is considered to be a legacy system if it has been in
operation for _ years. A legacy system has many
components.
► Many
► Less then seven
AL-JUNAID TECH INSTITUTE
► More than two
► Less than ten
Question No: 14
A major issue in requirements engineering is the rate at which
requirements change once the requirements phase has
"officially"_ .
► Ended
► Approved
► Deleted
► Started
Question No: 15
The implemented requirement has been through the
selected approach, such as testing or inspection.
► Verified
► Deleted
► Approved
► Ignored
Question No: 16
According to a standish Group report, lack is responsible
for 13% of all project failures,
► User input
► Output
► Resources
► Development Plan
Question No: 17
AL-JUNAID TECH INSTITUTE
is a quality assurance process used to reduce defects by
avoiding or correcting mistakes in early design and development
phases.
► Poka-Yoke
► Software Testing
► Software Change management
► Defect Removal
Question No: 18
According to Clemm, allows the user to specify
alternative forms of the system the selection of a appropriate
versions.
► Configuration Management
► Process Management
► Quality Management
► Cost Management
Question No: 19
is the probability that a program is operating according to
requirements at a given point in time.
► Availability
► Reliability
► Usability
► Security
Question No: 20
enhance the product feature set by replacing a product with
a newer version of the same product.
► Upgrade
► Re-Engineering
AL-JUNAID TECH INSTITUTE
► Update
► Deployment
Question No: 21
The equation to find out the Availability of software is:
► Availability = (MTTF / MTBF) x 100
► Availability = (MTTF / MTBF) / 100
► Availability = (MTTF + MTBF) / 100
► Availability = (MTTF - MTBF) / 100
Question No: 23
The software reengineering is a _ activity.
► Non-trivial
► Code
► Out dated
► Document
Question No: 24
A Software Requirement Specification (SRS) is traced if the
of requirements is clear.
► Origin Page 133
► Quality
► Standard
► Grammar
► Started
Question No: 27
are used by the development as a staging mechanism for
functionality including regular builds.
► Internal releases
AL-JUNAID TECH INSTITUTE
► External releases
► Major releases
► Feature releases
Question No: 28
are mechanisms that lead to prudential quality problem
before it occur or its rapid detection it introduced.
► Mistake-Proofing
► Mistake-Profiling
► Mistake-Provoking
► Mismanagement-Proofing
Question No: 29
Version Control discusses about:
► How does an Organization control changes before and after
installation released to a customer.
► How the resources will be assigned to tasks in work breakdown
structure (WBS).
► How the test cases will be executed before deploying each release.
► How many feature will be included in software.
Question No: 30
Which of the following is NOT one the tasks includes in Software
Configuration Management.
► Test Case development
► Version Control
► Configuration Auditing
► Change Control
Question No: 31
error is most costly to fix.
AL-JUNAID TECH INSTITUTE
► Requirement
► Design
► Implementation
► Testing
Question No: 32
analysis is the first step in the reengineering process.
► Inventory
► Code
► Database
► Document
Question No:32
Change Control process addresses the important question of:
who has the responsibility for approving and ranking changes (Page 121)
Question No: 33
are mechanisms that lead to prevention of potential quality
problem before it occurs or its rapid detection if introduced.
Mistake-Proofing (Page 117)
Question No 34
is an analysis technique which can be used to predict the chain
of events that can cause hazards.
Fault Tree Analysis (Page 117)
Question No 35
The goal of is to manage and control change.
Software Configuration Management (Page 119)
Question No 36
The reliability of a software can be determined by “MTBF” which stands for
.
Mean Time Between Failure (Page 116)
Question No 37
Legacy system migration however is a _ task and there are a
number of risks involved that need to be mitigated.
Easy (Page 134)
AL-JUNAID TECH INSTITUTE
Question No 38
errors are most costly to fix.
Requirement (Page 127)
Question No 39
is a quality assurance process used to reduce defects by avoiding
or correcting mistakes in early design and development phases.
Defect Removal (Page 69)
Question No 40
Poka Yoke is a Japanese term and it means:
Mistake Proofing (Page 118)
Question No 41
A/An is used to fine tune the product by fixing minor product
defects.
Update
Question No 42
is a quality assurance process used to reduce defects by avoiding
or correcting mistakes in early design and development phases.
Defect Removal
Question No 43
are mechanisms that lead to prevention of potential quality
problem before it occurs or its rapid detection if introduced.
Mistake-Proofing (Page 117)
Question No 44
Which of the following is NOT one of the tasks included in Software
Configuration Management:
Test Case development........... Page 121
Question No 45
‘CCB’ decides whether to allow or deny a change request, it stands for
.
Change Control Board ............. Page 124
Question No 46
Mean Time Between Failure (MTBF) can be calculated by .
MTBF=MTTF+MTTR ............. page 116
Question No 47
The goal of is to manage and control change.
AL-JUNAID TECH INSTITUTE
Software Configuration Management ………Page 119
Question No 48
Software configuration management tasks include Identification, Version
Control, Change Control, Configuration Auditing and _ .
Reporting ............ 121
Question No 49
Poka Yoke is the name of a .
Quality Assurance(QA) technique .............. Page 118
Question No 50
Normally the compound number, used for release version numbering, is of
the format:
X.Y.Z
Question No 51
The goal of software development is to develop software on time and
on budget, that meets customers’ real needs.
Quality ……… Page 127
Question No 52
Configuration Status Reporting (CSR) reports on:
A) What happened?
B) Who did it?
C) When did it happen?
D) All of the given options
Question No 53
The information items defined by Engineering Change Order (ECO)
include:
A) Criteria for review and audit
B) Work breakdown structure
C) The project Task Network
D) The change control test case
Question No 54
is one of the techniques to prepare project schedule once we
have defined "task network".
AL-JUNAID TECH INSTITUTE
A) Program evaluation and review techniques (PERT)
B) Critical Communication path method (CCPM)
C) System resource negotiation method (SRNM)
D) Strategic Schedule Development Technique (SSDT)
Question No 55
CPM stands for:
A) Critical Project Measure
B) Critical Path Method
C) Common Project Measure
D) Critical Planning Model
Question No 56
BAC stands for:
A) Budgeted Analysis Cost
B) Budget and Cost
C) Budget at compilation
D) Budget at Completion
Question No 57
The third digit (i.e. "Z") of the release version number format is called:
A) Major Release Number
B) Feature Release Number
C) Defect Repair Number
D) None of the given options
Question No 58
The equation to find out the Avaliability of software is:
A) Avaliability=(MTTF x MTTBF)/100
B) Avaliability=(MTTF / MTTBF)/100
C) Avaliability=(MTTF + MTTBF)/100
D) Avaliability=(MTTF - MTTBF)/100
AL-JUNAID TECH INSTITUTE
Question No 9
Schedule Performance Index (SPI) is equal to:
A) BCWP/BCWS
B) BCWP*BCWS
C) BCWP+BCWS
D) BCWP-BCWS
Question No 60
Following are effective guidelines for Review EXCEPT:
A) We need to review the product not the producer
B) Be sensitive to personal egos
C) Errors should be pointed out gently
D) Tone should be high and strict
Question No 61
The basic idea behind Software configuration management is:
A) To manage and control the change
B) To efficiently allocate the resources
C) To properly manage status reporting
D) None of the given options
Question No 61:
Software Usability
Software Availability
Software Portability
Software Safety
Question No 65:
Which of the following is not one of the responsibilities of configuration
Audit team?
To verify that a FTR has been conducted to assess technical correctness
To verify that all related DCI’s been properly updated.
To verify that all the change requests are deleted after implementation
To verify that DE standards have been properly applied.
Question No 66:
AL-JUNAID TECH INSTITUTE
In a review the should be pointed our gently and the tone should be
loose and constructive.
Inputs
Outputs
Conditions
Errors
Question No 67:
A Quantitative quality measuring techniques that helps to uncover root cause
for and error and then work on to fix what was traced is called_ _
Non-Statistical Software Quality Assurance
Formal Techniques review
Walkthrough NOT SURE
Statistical Software Quality Assurances
Question No 68:
A/An is used to fine tune the product by fixing minor product
defects.
Deployment
Upgrade
Enhancement
Update
Question No 69:
Which of the following is an example of Software Configuration Item (SCI):?
Reusability
Test Case and Integration Plan
Business Plain
Requirements Plan
Question No 70:
Test Case
Test Case and Integration Plan
AL-JUNAID TECH INSTITUTE
Design specification
None
Question No 71:
If is not handled properly may create certain problem like
identification and tracking. Version and software delivery related problem.
Process Implement
Process Management
Changes Chaos
Change documentation
Question No 72:
If the version of a release changes from 1.0.0 to 2.0.0.what will you conclude
about new release(having version 2.0.0)
There were major changes in functionality
Bugs in previous functionality was removed
There were no changes in the functionality
There were partially change in functionality
Question No 73:
Earned Value Analysis (EVA) is a technique for assessing the progress of a project
Qualitative
Quantitative
Subjective
None
Question No 74:
The basic idea behind Software configuration management is:
To manage and control the change
To efficiently allocate the resources
To properly manage status reporting
None
Question No 75:
Following are effective guidelines for Review EXCEPT
We need to review the product, not the producer
Be sensitive to personal egos
Errors should be pointed out gently
Tone should be high and strict
AL-JUNAID TECH INSTITUTE
Question No 76:
if :
E = Errors found before shipment
D = Errors found during operation
Then Defect Removal Efficiency (DRE) is equal to:
DRE = E + (E+D)
DRE = E-(E+D)
DRE = E*(E+D)
DRE = E/(E+D)
Question No 77:
In order to use the PERT and CPM, which one of the following is NOT required?
Decomposition of tasks - also known as the work breakdown structure (WBS)
Teams communication mode details
Estimation of effort
Interdependencies
Question No 74:
If an error related to requirements is identified in testing phase, this error will be
considered as an error of phase
Requirement
Design
Code
Testing
Question No 75:
Quality cost may be delivered into costs associated with:
Prevention, appraisal and failure
Customers, developers and maintenance
Builds, releases and products
Bugs, errors and reports
Question No 76:
Poka-Yoke is the name of a
QA technique
Japanese dish
Idiom
None
Question No 77:
Configuration Auditing deals with:
Ensuring that Resources have been allocated properly
Ensuring that changes are implemented parallel with SDLC framework activities
Ensuring that the changes have been implemented properly
All of the given
Question No 78:
FTR stands for:
Feasibility of technical requirement
Fetched Technical Requirement
AL-JUNAID TECH INSTITUTE
Formal Technical Review
None
Question No 79:
A Software Requirement Specification is traced if the of its requirements is clear.
Quality
Slandered
Origin
None
Question No 80:
Version Control discusses about:
How does an organization control changes before and after software is released
to a customer
How the resources will be assigned to tasks in work breakdown structure (WBS)
How the test cases will be executed before deploying each release.
All of given
Question No 81:
The implemented requirement has been through the selected approach, such as
testing or inspection.
Verified
Deleted
Approved
None
Question No 82:
The Software reengineering is a activity.
Code
Out dated
Document
Non-trivial
Question No 83:
Which of the following is NOT an example of Software Configuration Item (SCI):
Test Case
Integration Plan
Design specification
None
Question No 84:
Mean Time Between Failure (MTBF) can be calculated by:
MTBF = MTTF + MTTR
MTBF = MTTF - MTTR
MTBF = (MTTF/MTTR)*100
AL-JUNAID TECH INSTITUTE
MTBF = (MTTR/MTTF)*100
Question No 85:
software development is itself risky as changes to one part of the system
inevitably involve further changes to other components.
Forward
Reverse
Old
New
Question No 86:
Program is restructured the reverse engineering phase. In this case we modify
source code and data in order to make it amenable to future changes.
After
None
Along with
Before
Question No 87:
Managers look at the system from the angle that does the system and associated
business process make an effective contribution to the business goal?
Senior
IT
None
Line
Question No 88:
user assess the system from the perspective of how effective do they find the
system in supporting their business processes and how much of the system
functionality is used.
Senior
IT
Line
End
Question No 89:
A system is considered to be a legacy system if it has been in operation for years.
A legacy system has many components.
Less than seven
Many
More than two
Less than ten
Question No 90:
Legacy system migration, however, is an easy task and there are a number of risks
involved that need to be mitigated
Simple
AL-JUNAID TECH INSTITUTE
Crucial
None
Easy
Question No 91:
engineering does not simply create a modern equivalent of an older program,
rather new user and technology requirements are integrated into the reengineering
effort
Forward
None
Reverse
BPR
Question No 92:
Which of the following the NOT one of the attributes of requirements.
Requirement ID
Creation Date
Created By
Received By
Question No 93:
If the version of a release changes from 1.0.0 to 2.0.0 what will you conclude about
new release (having version 2.0.0)
There was no change in functionality
There was major change in functionality
There was partial change in functionality
Bugs in previous functionality were removed
Question No 95:
Which of the following is NOT one of the tasks included in Software Configuration
Management.
Version Control
Configuration Auditing
Test Case development
Change control
AL-JUNAID TECH INSTITUTE